US9288264B2 - System and method for implementing a cloud workflow - Google Patents
System and method for implementing a cloud workflow Download PDFInfo
- Publication number
- US9288264B2 US9288264B2 US12/612,895 US61289509A US9288264B2 US 9288264 B2 US9288264 B2 US 9288264B2 US 61289509 A US61289509 A US 61289509A US 9288264 B2 US9288264 B2 US 9288264B2
- Authority
- US
- United States
- Prior art keywords
- domain
- cloud computing
- computing environment
- steps
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Definitions
- Cloud computing is a type of computing in which dynamically scalable and typically virtualized resources are provided as services via the Internet. As a result, users need not, and typically do not, possess knowledge of, expertise in, or control over the technology and/or infrastructure implemented in the cloud.
- Cloud computing generally incorporates infrastructure as a service (“IaaS”), platform as a service (“PaaS”), and/or software as a service (“SaaS”).
- IaaS infrastructure as a service
- PaaS platform as a service
- SaaS software as a service
- cloud computing services provide common applications online, which applications are accessed using a web browser and the software and data for which are stored on servers comprising the cloud.
- Cloud computing customers typically do not own or possess the physical infrastructure that hosts their software platform; rather, the infrastructure is leased in some manner from a third-party provider. Cloud computing customers can avoid capital expenditures by paying a provider for only what they use on a utility, or resources consumed, basis or a subscription, or time-based, basis, for example. Sharing computing power and/or storage capacity among multiple lessees has many advantages, including improved utilization rates and an increase in overall computer usage.
- Cloud computing and cloud storage are rapidly redefining the landscape of the enterprise data center. Rather than expanding data center capacity to meet processing and storage needs, modern enterprises are expanding into the cloud to obtain needed computing and storage resources for day to day and burst requirements. In order for cloud computing to be successful from the enterprise point of view, utilizing cloud assets must be as transparent as accessing enterprise assets in the data center. Workflow request processing and routing has become an integral part of the modern enterprise wherein rights and privileges can be maintained on an ad hoc or just in time basis. As an employee needs access to assets a workflow is started in which the appropriate permissions and attestations are obtained so that an auditable decision to allow the user access (or disallow the access) is maintained and the appropriate rights and privileges are granted.
- One embodiment is a method for implementing a workflow of a first domain, wherein the workflow is implemented as a series of steps to accomplish a workload and wherein at least one of the steps utilizes a process.
- the method comprises establishing a mutual trust relationship between the first domain and a second domain; wherein one of the steps is authored by the second domain, the method further comprising associating with the step authored by the second domain a digital attestation for enabling the first domain to verify authorship and non-modification thereof.
- FIG. 1 illustrates an exemplary IaaS cloud structure such as may be implemented in one embodiment.
- FIG. 2 is a flow diagram of one embodiment of a process for implementing a cloud workflow.
- the embodiments described herein provide a mechanism for allowing two or more independent trust domains to participate in a workflow to accomplish some work mechanism where part of the processing and storage may exist in the cloud.
- the embodiments described herein further provide a mechanism to allow the trust model to extend into the cloud such that the processing and/or storage (hereinafter collectively referred to as “process” or “processes”) required by the workflow can be completely trusted by any of the participating trust environments.
- FIG. 1 illustrates an exemplary IaaS cloud structure.
- the cloud structure includes a hardware layer 100 comprising storage assets 102 , processing assets 104 , and network assets 106 .
- workloads are sponsored in the cloud as virtual machines possibly accessing virtualized storage and/or virtualized networks. This is accomplished via a virtualization layer 108 .
- the hardware layer 100 is insulated from the actual workloads to be sponsored in the cloud at a layer 110 by the virtualization layer 108 hardware, storage, and networking so that the operating system selected by the enterprise can be sponsored on whatever hardware the cloud provider makes available.
- workloads hosted in the workload layer 110 which is the layer the customer typically views as the “cloud”.
- workloads 111 are workloads that are germane to the operation of the cloud and may consist of monitoring processes for enabling the cloud provider to monitor the health of the cloud, management processes to enable the cloud provider to ensure that service-level agreements are enforced, and so on.
- CMDB configuration management database
- a workflow is designed in a manner well-known in the art and comprises a series of steps that utilize processes to accomplish some workload. Specific types of processes, such as branching, joining, and distributing, for example, are also known in the art.
- a workflow 200 comprises multiple steps 202 A- 202 E, each of which may utilize processes, such as processes 203 A- 203 C, to accomplish a workload.
- one or more of the steps 202 A- 202 E may be authored by separate domains having a mutual trust relationship, represented in FIG. 2 by enterprises 204 A and 204 B, respectively comprising first and second trust domains.
- step 202 D is a part of the workflow 200 accessible by the enterprise 204 A, but is actually authored by a separate trust domain; specifically, the enterprise 204 B, as represented by dashed lines.
- a step that is authored by a separate trust domain has a digital attestation attached to or otherwise associated with it so that the enterprise 204 A can verify that the step has indeed been authored by the other trust domain (in this case, the enterprise 204 B) and has not been modified.
- the steps in the workflow 200 may reference processes that reside in a cloud 206 , such as the process 203 C.
- the workflow 200 must be integrated so that such a process is accessible by all of the trust domains, or enterprises 204 A, 204 B, that are participating in the workflow. This can be accomplished through use of mechanisms previously disclosed one or more of the above-noted patents previously incorporated by reference; particularly U.S. patent application Ser. No. 12/612,841 filed on Nov. 5, 2009. In brief, access is granted because each process 203 A- 203 C has associated therewith assertions that other trust domains can satisfy because of the knowledge of cryptographic keys or other attestations to which the enterprise has access.
- step 202 D the process 203 C is moved to the cloud 206 by the enterprise 204 A in a manner that allows access by the enterprise 204 B so that the step 202 D can be completed.
- the step 202 D is also moved from the enterprise 204 A to either the cloud 206 or to the enterprise 204 B via the cloud 206 .
- the enterprise 204 B processes the step 202 D in the cloud 206 ;
- the step 202 D is processed within the trust domain of the enterprise 204 B and then the resulting information is shared back to the other trust domains (e.g., the enterprise 204 A) either in the cloud 206 or through the cloud 206 or through some secure channel, implementation of which may be as described in one or more of the aforementioned patent applications.
- steps 202 A and 202 B are processed in the first trust domain; i.e., the enterprise 204 A.
- the workflow 200 splits such that steps 202 C and 202 D are performed in parallel.
- Step 202 C is processed by the enterprise 204 A
- step 202 D is processed by the enterprise 204 B.
- step 202 D has associated therewith the process 203 C, which is processed in the cloud 206 .
- the process 203 C must participate in the trust mechanism so that the enterprise 204 B can utilize the process 203 C without concern.
- storage could be tagged by the enterprise 204 A and thereafter used by the step 202 D within the trust domain of the enterprise 204 B.
- steps 202 C and 202 D are joined and the joint responses are processed by the step 202 E, which accesses storage in the cloud 206 that was populated by the process 203 C as a result of the step 202 D via the enterprise 204 B.
- a persistent and organized data store such as an Oracle database
- This alternative embodiment addresses environments in which a substantial amount of processing and storage assets are resident in the cloud and utilized by workflow processes.
- the step 202 D may be unknown to the enterprise 204 A and only a reference from the step 202 B is part of the workflow 200 .
- the enterprise 204 B has complete control over the step 202 D returning the result to the step 202 E via some sharing mechanism (such as the storage shown in the cloud or some protocol channel).
- the entire workflow 200 may be hosted in the cloud 206 , with all trust domains 204 A, 204 B, having access to the workflow.
- Each trust domain 204 A, 204 B may posses rights to all aspects of the workflow 206 or only certain ones of the steps 202 A- 202 E may be tagged so that a given trust domain may edit only the steps tagged in such a manner as to allow access. In another embodiment, only portions of the workflow 200 are hosted in the cloud 206 .
- reassignment may occur across different trust domains because of the way that the trust mechanism is defined across the different trust domains in a manner that will be apparent to one of ordinary skill in the art.
Abstract
Description
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/612,895 US9288264B2 (en) | 2008-08-25 | 2009-11-05 | System and method for implementing a cloud workflow |
US12/612,903 US9742864B2 (en) | 2008-08-25 | 2009-11-05 | System and method for implementing cloud mitigation and operations controllers |
Applications Claiming Priority (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/197,833 US9071443B2 (en) | 2008-08-25 | 2008-08-25 | Automated service platform prospecting |
US12/612,818 US20100235355A1 (en) | 2009-03-13 | 2009-11-05 | System and method for unified cloud management |
US12/613,077 US8429716B2 (en) | 2009-11-05 | 2009-11-05 | System and method for transparent access and management of user accessible cloud assets |
US12/612,882 US9614855B2 (en) | 2009-11-05 | 2009-11-05 | System and method for implementing a secure web application entitlement service |
US12/612,925 US8516293B2 (en) | 2009-11-05 | 2009-11-05 | System and method for implementing a cloud computer |
US12/612,807 US8065395B2 (en) | 2009-03-13 | 2009-11-05 | System and method for queuing to a cloud via a queuing proxy |
US12/613,112 US9122533B2 (en) | 2009-03-13 | 2009-11-05 | System and method for reducing cloud IP address utilization using a distributor registry |
US12/613,098 US9658891B2 (en) | 2009-03-13 | 2009-11-05 | System and method for providing key-encrypted storage in a cloud computing environment |
US12/612,841 US8286232B2 (en) | 2009-03-13 | 2009-11-05 | System and method for transparent cloud access |
US12/612,895 US9288264B2 (en) | 2008-08-25 | 2009-11-05 | System and method for implementing a cloud workflow |
US12/612,903 US9742864B2 (en) | 2008-08-25 | 2009-11-05 | System and method for implementing cloud mitigation and operations controllers |
US12/612,834 US8364842B2 (en) | 2009-03-13 | 2009-11-05 | System and method for reduced cloud IP address utilization |
Publications (2)
Publication Number | Publication Date |
---|---|
US20110106926A1 US20110106926A1 (en) | 2011-05-05 |
US9288264B2 true US9288264B2 (en) | 2016-03-15 |
Family
ID=43926554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/612,895 Active 2034-07-18 US9288264B2 (en) | 2008-08-25 | 2009-11-05 | System and method for implementing a cloud workflow |
Country Status (1)
Country | Link |
---|---|
US (1) | US9288264B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150039700A1 (en) * | 2013-08-05 | 2015-02-05 | Aol Inc. | Systems and methods for managing electronic communications |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9529689B2 (en) | 2009-11-30 | 2016-12-27 | Red Hat, Inc. | Monitoring cloud computing environments |
WO2012023050A2 (en) | 2010-08-20 | 2012-02-23 | Overtis Group Limited | Secure cloud computing system and method |
US8918501B2 (en) | 2011-11-10 | 2014-12-23 | Microsoft Corporation | Pattern-based computational health and configuration monitoring |
US8819090B2 (en) * | 2012-04-23 | 2014-08-26 | Citrix Systems, Inc. | Trusted file indirection |
US9064240B2 (en) | 2012-04-27 | 2015-06-23 | Hewlett-Packard Development Company, L.P. | Application based on node types associated with implicit backtracking |
US9160747B2 (en) * | 2012-07-04 | 2015-10-13 | Basware Corporation | Method for data access control of third parties in a multitenant system |
Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5428738A (en) | 1993-05-21 | 1995-06-27 | Novell, Inc. | Logical expression calculation interface |
US5608903A (en) | 1994-12-15 | 1997-03-04 | Novell, Inc. | Method and apparatus for moving subtrees in a distributed network directory |
US5677851A (en) | 1994-12-15 | 1997-10-14 | Novell, Inc. | Method and apparatus to secure digital directory object changes |
US5787175A (en) | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US5832275A (en) | 1994-12-13 | 1998-11-03 | Novell, Inc. | System for dynamically replacing operating software which provides distributed directory service after verifying that versions of new software and the operating software are compatible |
US5832487A (en) | 1994-12-15 | 1998-11-03 | Novell, Inc. | Replicated object identification in a partitioned hierarchy |
US5870564A (en) | 1996-03-01 | 1999-02-09 | Novell, Inc. | Near-optimal path apparatus and method |
US5878415A (en) | 1997-03-20 | 1999-03-02 | Novell, Inc. | Controlling access to objects in a hierarchical database |
US5878419A (en) | 1996-01-19 | 1999-03-02 | Novell, Inc. | Method for creating a relational description of a formatted transaction |
US6067572A (en) | 1996-11-07 | 2000-05-23 | Novell, Inc. | Extrinsically influenced near-optimal path apparatus and method |
US6108619A (en) | 1998-07-02 | 2000-08-22 | Novell, Inc. | Method and apparatus for semantic characterization of general content streams and repositories |
US6119230A (en) | 1997-10-01 | 2000-09-12 | Novell, Inc. | Distributed dynamic security capabilities |
US6185612B1 (en) | 1998-10-29 | 2001-02-06 | Novell, Inc. | Secure distribution and use of weighted network topology information |
US6219652B1 (en) | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US6275819B1 (en) | 1999-03-16 | 2001-08-14 | Novell, Inc. | Method and apparatus for characterizing and retrieving query results |
US6405199B1 (en) | 1998-10-30 | 2002-06-11 | Novell, Inc. | Method and apparatus for semantic token generation based on marked phrases in a content stream |
US6459809B1 (en) | 1999-07-12 | 2002-10-01 | Novell, Inc. | Searching and filtering content streams using contour transformations |
US6519610B1 (en) | 2000-09-01 | 2003-02-11 | Novell, Inc. | Distributed reference links for a distributed directory server system |
US6539381B1 (en) | 1999-04-21 | 2003-03-25 | Novell, Inc. | System and method for synchronizing database information |
US6601171B1 (en) | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US6647408B1 (en) | 1999-07-16 | 2003-11-11 | Novell, Inc. | Task distribution |
US6697497B1 (en) | 1998-12-22 | 2004-02-24 | Novell, Inc. | Boundary identification and characterization through density differencing |
US6738907B1 (en) | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
US6742035B1 (en) | 2000-02-28 | 2004-05-25 | Novell, Inc. | Directory-based volume location service for a distributed file system |
US6772214B1 (en) | 2000-04-27 | 2004-08-03 | Novell, Inc. | System and method for filtering of web-based content stored on a proxy cache server |
US6862606B1 (en) | 2001-05-11 | 2005-03-01 | Novell, Inc. | System and method for partitioning address space in a proxy cache server cluster |
US6993508B1 (en) | 2000-12-29 | 2006-01-31 | Novell, Inc. | Method and mechanism for vending digital content |
US7107538B1 (en) | 2002-09-12 | 2006-09-12 | Novell, Inc. | Enforcing security on an attribute of an object |
US7152031B1 (en) | 2000-02-25 | 2006-12-19 | Novell, Inc. | Construction, manipulation, and comparison of a multi-dimensional semantic space |
US7177922B1 (en) | 2000-09-05 | 2007-02-13 | Novell, Inc. | Policy enforcement using the semantic characterization of traffic |
US7197451B1 (en) | 1998-07-02 | 2007-03-27 | Novell, Inc. | Method and mechanism for the creation, maintenance, and comparison of semantic abstracts |
US7286977B1 (en) | 2000-09-05 | 2007-10-23 | Novell, Inc. | Intentional-stance characterization of a general content stream or repository |
US7299493B1 (en) | 2003-09-30 | 2007-11-20 | Novell, Inc. | Techniques for dynamically establishing and managing authentication and trust relationships |
US7316027B2 (en) | 2004-02-03 | 2008-01-01 | Novell, Inc. | Techniques for dynamically establishing and managing trust relationships |
US7334257B1 (en) | 2003-10-31 | 2008-02-19 | Novell, Inc. | Techniques for preserving content during a redirection for authentication |
US20080091613A1 (en) * | 2006-09-28 | 2008-04-17 | Microsoft Corporation | Rights management in a cloud |
US7363577B2 (en) | 2004-05-18 | 2008-04-22 | Novell, Inc. | Techniques for serializing events |
US7376134B2 (en) | 2004-08-02 | 2008-05-20 | Novell, Inc. | Privileged network routing |
US7389225B1 (en) | 2000-10-18 | 2008-06-17 | Novell, Inc. | Method and mechanism for superpositioning state vectors in a semantic abstract |
US7426516B1 (en) | 2003-11-24 | 2008-09-16 | Novell, Inc. | Mechanism for supporting indexed tagged content in a general purpose data store |
US7467415B2 (en) | 2003-09-30 | 2008-12-16 | Novell, Inc. | Distributed dynamic security for document collaboration |
US7505972B1 (en) | 2004-03-08 | 2009-03-17 | Novell, Inc. | Method and system for dynamic assignment of entitlements |
US20110066847A1 (en) * | 2009-09-15 | 2011-03-17 | Symantec Corporation | Just In Time Trust Establishment and Propagation |
-
2009
- 2009-11-05 US US12/612,895 patent/US9288264B2/en active Active
Patent Citations (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5428738A (en) | 1993-05-21 | 1995-06-27 | Novell, Inc. | Logical expression calculation interface |
US5832275A (en) | 1994-12-13 | 1998-11-03 | Novell, Inc. | System for dynamically replacing operating software which provides distributed directory service after verifying that versions of new software and the operating software are compatible |
US5956718A (en) | 1994-12-15 | 1999-09-21 | Novell, Inc. | Method and apparatus for moving subtrees in a distributed network directory |
US5608903A (en) | 1994-12-15 | 1997-03-04 | Novell, Inc. | Method and apparatus for moving subtrees in a distributed network directory |
US5677851A (en) | 1994-12-15 | 1997-10-14 | Novell, Inc. | Method and apparatus to secure digital directory object changes |
US5758344A (en) | 1994-12-15 | 1998-05-26 | Novell, Inc. | Method and apparatus for moving subtrees in a distributed network directory |
US5784560A (en) | 1994-12-15 | 1998-07-21 | Novell, Inc. | Method and apparatus to secure distributed digital directory object changes |
US5832487A (en) | 1994-12-15 | 1998-11-03 | Novell, Inc. | Replicated object identification in a partitioned hierarchy |
US5787175A (en) | 1995-10-23 | 1998-07-28 | Novell, Inc. | Method and apparatus for collaborative document control |
US5878419A (en) | 1996-01-19 | 1999-03-02 | Novell, Inc. | Method for creating a relational description of a formatted transaction |
US5870564A (en) | 1996-03-01 | 1999-02-09 | Novell, Inc. | Near-optimal path apparatus and method |
US6067572A (en) | 1996-11-07 | 2000-05-23 | Novell, Inc. | Extrinsically influenced near-optimal path apparatus and method |
US5878415A (en) | 1997-03-20 | 1999-03-02 | Novell, Inc. | Controlling access to objects in a hierarchical database |
US6119230A (en) | 1997-10-01 | 2000-09-12 | Novell, Inc. | Distributed dynamic security capabilities |
US6760843B1 (en) | 1998-01-20 | 2004-07-06 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
US6738907B1 (en) | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
US6219652B1 (en) | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US6108619A (en) | 1998-07-02 | 2000-08-22 | Novell, Inc. | Method and apparatus for semantic characterization of general content streams and repositories |
US7197451B1 (en) | 1998-07-02 | 2007-03-27 | Novell, Inc. | Method and mechanism for the creation, maintenance, and comparison of semantic abstracts |
US6185612B1 (en) | 1998-10-29 | 2001-02-06 | Novell, Inc. | Secure distribution and use of weighted network topology information |
US6405199B1 (en) | 1998-10-30 | 2002-06-11 | Novell, Inc. | Method and apparatus for semantic token generation based on marked phrases in a content stream |
US6697497B1 (en) | 1998-12-22 | 2004-02-24 | Novell, Inc. | Boundary identification and characterization through density differencing |
US6742114B1 (en) | 1999-02-18 | 2004-05-25 | Novell, Inc. | Deputization in a distributed computing system |
US6601171B1 (en) | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US7185047B1 (en) | 1999-02-18 | 2007-02-27 | Novell, Inc. | Caching and accessing rights in a distributed computing system |
US6275819B1 (en) | 1999-03-16 | 2001-08-14 | Novell, Inc. | Method and apparatus for characterizing and retrieving query results |
US6826557B1 (en) | 1999-03-16 | 2004-11-30 | Novell, Inc. | Method and apparatus for characterizing and retrieving query results |
US6539381B1 (en) | 1999-04-21 | 2003-03-25 | Novell, Inc. | System and method for synchronizing database information |
US6650777B1 (en) | 1999-07-12 | 2003-11-18 | Novell, Inc. | Searching and filtering content streams using contour transformations |
US6459809B1 (en) | 1999-07-12 | 2002-10-01 | Novell, Inc. | Searching and filtering content streams using contour transformations |
US7356819B1 (en) | 1999-07-16 | 2008-04-08 | Novell, Inc. | Task distribution |
US6647408B1 (en) | 1999-07-16 | 2003-11-11 | Novell, Inc. | Task distribution |
US7475008B2 (en) | 2000-02-25 | 2009-01-06 | Novell, Inc. | Construction, manipulation, and comparison of a multi-dimensional semantic space |
US7152031B1 (en) | 2000-02-25 | 2006-12-19 | Novell, Inc. | Construction, manipulation, and comparison of a multi-dimensional semantic space |
US6742035B1 (en) | 2000-02-28 | 2004-05-25 | Novell, Inc. | Directory-based volume location service for a distributed file system |
US7043555B1 (en) | 2000-04-27 | 2006-05-09 | Novell, Inc. | Techniques for content filtering |
US7506055B2 (en) | 2000-04-27 | 2009-03-17 | Novell, Inc. | System and method for filtering of web-based content stored on a proxy cache server |
US6772214B1 (en) | 2000-04-27 | 2004-08-03 | Novell, Inc. | System and method for filtering of web-based content stored on a proxy cache server |
US6519610B1 (en) | 2000-09-01 | 2003-02-11 | Novell, Inc. | Distributed reference links for a distributed directory server system |
US7177922B1 (en) | 2000-09-05 | 2007-02-13 | Novell, Inc. | Policy enforcement using the semantic characterization of traffic |
US7286977B1 (en) | 2000-09-05 | 2007-10-23 | Novell, Inc. | Intentional-stance characterization of a general content stream or repository |
US7562011B2 (en) | 2000-09-05 | 2009-07-14 | Novell, Inc. | Intentional-stance characterization of a general content stream or repository |
US7389225B1 (en) | 2000-10-18 | 2008-06-17 | Novell, Inc. | Method and mechanism for superpositioning state vectors in a semantic abstract |
US7386514B2 (en) | 2000-12-29 | 2008-06-10 | Novell, Inc. | Method and mechanism for vending digital content |
US6993508B1 (en) | 2000-12-29 | 2006-01-31 | Novell, Inc. | Method and mechanism for vending digital content |
US6862606B1 (en) | 2001-05-11 | 2005-03-01 | Novell, Inc. | System and method for partitioning address space in a proxy cache server cluster |
US7107538B1 (en) | 2002-09-12 | 2006-09-12 | Novell, Inc. | Enforcing security on an attribute of an object |
US7467415B2 (en) | 2003-09-30 | 2008-12-16 | Novell, Inc. | Distributed dynamic security for document collaboration |
US7552468B2 (en) | 2003-09-30 | 2009-06-23 | Novell, Inc. | Techniques for dynamically establishing and managing authentication and trust relationships |
US7299493B1 (en) | 2003-09-30 | 2007-11-20 | Novell, Inc. | Techniques for dynamically establishing and managing authentication and trust relationships |
US7334257B1 (en) | 2003-10-31 | 2008-02-19 | Novell, Inc. | Techniques for preserving content during a redirection for authentication |
US7426516B1 (en) | 2003-11-24 | 2008-09-16 | Novell, Inc. | Mechanism for supporting indexed tagged content in a general purpose data store |
US7316027B2 (en) | 2004-02-03 | 2008-01-01 | Novell, Inc. | Techniques for dynamically establishing and managing trust relationships |
US7505972B1 (en) | 2004-03-08 | 2009-03-17 | Novell, Inc. | Method and system for dynamic assignment of entitlements |
US7363577B2 (en) | 2004-05-18 | 2008-04-22 | Novell, Inc. | Techniques for serializing events |
US7376134B2 (en) | 2004-08-02 | 2008-05-20 | Novell, Inc. | Privileged network routing |
US20080091613A1 (en) * | 2006-09-28 | 2008-04-17 | Microsoft Corporation | Rights management in a cloud |
US20110066847A1 (en) * | 2009-09-15 | 2011-03-17 | Symantec Corporation | Just In Time Trust Establishment and Propagation |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150039700A1 (en) * | 2013-08-05 | 2015-02-05 | Aol Inc. | Systems and methods for managing electronic communications |
US10122656B2 (en) * | 2013-08-05 | 2018-11-06 | Oath Inc. | Systems and methods for managing electronic communications |
US10630616B2 (en) | 2013-08-05 | 2020-04-21 | Oath Inc. | Systems and methods for managing electronic communications |
US10887256B2 (en) | 2013-08-05 | 2021-01-05 | Verizon Media Inc. | Systems and methods for managing electronic communications |
US11750540B2 (en) | 2013-08-05 | 2023-09-05 | Verizon Patent And Licensing Inc. | Systems and methods for managing electronic communications |
Also Published As
Publication number | Publication date |
---|---|
US20110106926A1 (en) | 2011-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7304449B2 (en) | Data management for multi-tenant identity cloud services | |
JP6491774B2 (en) | Multi-tenant identity and data security management cloud service | |
US10831789B2 (en) | Reference attribute query processing for a multi-tenant cloud service | |
CN110557975B (en) | Tenant data comparison for multi-tenant identity cloud services | |
JP7281483B2 (en) | Declarative Third-Party Identity Provider Integration for Multi-Tenant Identity Cloud Services | |
US11394714B2 (en) | Controlling user access to command execution | |
CN109565511B (en) | Tenant and service management for multi-tenant identity and data security management cloud services | |
US8286232B2 (en) | System and method for transparent cloud access | |
US9628471B1 (en) | Protecting user identity at a cloud using a distributed user identity system | |
US9003502B2 (en) | Hybrid multi-tenancy cloud platform | |
CN112913208B (en) | Multi-tenant identity cloud service with in-house deployed authentication integration and bridge high availability | |
CN112154639B (en) | Multi-factor authentication without user footprint | |
US9886563B2 (en) | Personalized online content access experiences using inferred user intent to configure online session attributes | |
US10305912B2 (en) | Methods of enabling inter-organizational and public social collaboration | |
US9288264B2 (en) | System and method for implementing a cloud workflow | |
US10325076B2 (en) | Personalized online content access experiences using online session attributes | |
JP2021517674A (en) | Detect and resolve data replication conflicts for multi-tenant identity cloud services | |
EP2715971B1 (en) | Automating cloud service reconnections | |
US20110282975A1 (en) | Techniques for dynamic cloud-based edge service computing | |
CN112805699A (en) | Authentication integrated multi-tenant identity cloud service with on-premise deployment | |
US20110107411A1 (en) | System and method for implementing a secure web application entitlement service | |
US20140280583A1 (en) | Multi-tenancy support for enterprise social business computing | |
US11611548B2 (en) | Bulk multifactor authentication enrollment | |
US20120191758A1 (en) | Programmatically enabling user access to crm secured field instances based on secured field instance settings | |
WO2020106845A1 (en) | Enabling access across private networks for a managed blockchain service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCCLAIN, CAROLYN BENNION;CARTER, STEPHEN R.;BURCH, LLOYD LEON;AND OTHERS;SIGNING DATES FROM 20091019 TO 20091026;REEL/FRAME:023480/0826 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST;ASSIGNOR:NOVELL, INC.;REEL/FRAME:026270/0001 Effective date: 20110427 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST (SECOND LIEN);ASSIGNOR:NOVELL, INC.;REEL/FRAME:026275/0018 Effective date: 20110427 |
|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST IN PATENTS FIRST LIEN (RELEASES RF 026270/0001 AND 027289/0727);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0077 Effective date: 20120522 Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY IN PATENTS SECOND LIEN (RELEASES RF 026275/0018 AND 027290/0983);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0154 Effective date: 20120522 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST FIRST LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0216 Effective date: 20120522 Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST SECOND LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0316 Effective date: 20120522 |
|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0316;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034469/0057 Effective date: 20141120 Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0216;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034470/0680 Effective date: 20141120 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:MICRO FOCUS (US), INC.;BORLAND SOFTWARE CORPORATION;ATTACHMATE CORPORATION;AND OTHERS;REEL/FRAME:035656/0251 Effective date: 20141120 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW Free format text: NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:042388/0386 Effective date: 20170501 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ATTACHMATE CORPORATION;BORLAND SOFTWARE CORPORATION;NETIQ CORPORATION;AND OTHERS;REEL/FRAME:044183/0718 Effective date: 20170901 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE TO CORRECT TYPO IN APPLICATION NUMBER 10708121 WHICH SHOULD BE 10708021 PREVIOUSLY RECORDED ON REEL 042388 FRAME 0386. ASSIGNOR(S) HEREBY CONFIRMS THE NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:048793/0832 Effective date: 20170501 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: SURCHARGE FOR LATE PAYMENT, LARGE ENTITY (ORIGINAL EVENT CODE: M1554); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: SERENA SOFTWARE, INC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |